Risk
1/24/2013
12:53 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Finds People Want More Privacy Control

Almost half of U.S. adults feel they can't control how online companies collect personal information.

The purpose of Data Privacy Day, to be observed on Monday, January 28, is to empower individuals to protect their privacy and to control their digital footprint. Five years into this particular observance, there's still much work to be done.

About 45% of 1,000 U.S. adults surveyed on behalf of Microsoft by Ipsos Public Affairs believe they have little or no control over the personal information companies gather about them while using online services.

Yet almost as many, about 40%, believe they totally or mostly understand how to protect their privacy online. Approximately the same percentage says they rely on friends, family and privacy statements as their primary sources of privacy information. About a third of respondents say they pay close attention to companies' privacy reputations when choosing online services.

[ Google is getting more requests for information from the government. Read more at Google Sees Growing Government Demand For User Data. ]

Brendon Lynch, chief privacy officer at Microsoft, said in an interview that while most of those concerned about privacy probably aren't reading privacy policies line by line, they are paying attention and companies can't afford to ignore such concerns. "It's incumbent for organizations to be good stewards of the data and to really be more transparent and to provide people with more information about how they can protect themselves," said Lynch.

Privacy has been a part of Microsoft's Trustworthy Computing initiative for over a decade. But it has become particularly important in the age of mobile social computing. As Google's services have begun to destabilize the foundations of Microsoft's desktop empire and businesses have begun to be seduced by the promise of "big data," Microsoft has been looking to privacy as a key point of differentiation.

"The way that we've been thinking about privacy increasingly is it's a feature, when you're producing software and services and devices," Lynch said. "We're viewing privacy as a way to better understand what our customers want and what they think and then deliver against that need."

To give customers more control over their online data, Microsoft has developed services like its Personal Data Dashboard and has implemented Web browsing features like Do Not Track, despite lack of industry consensus.

Some people see privacy as an all-or-nothing proposition. Lynch argues that privacy is better defined as a set of choices. He believes that privacy can coexist with services that encourage people to share information.

"There's this potential definition of privacy which is binary, which is more akin to secrecy," he said. "But it's really evolved. ...It's not so much about secrecy anymore as it is about control. So yes, people want to share information, but they want to share information [selectively]. What our research showed us is there's still a significant portion of the population that doesn't feel in control ... and they're looking to learn more about how they can be in more control about their privacy."

Privacy has never worked very well as a business. Like security, it tends to something people become interested in after it's too late. Rewind a decade and you'll find the ruins of several dot-com boom startups that failed to sell privacy as a service.

Control, on the other hand, might just sell. But it will be hard to convince people they have control when terms of service documents enforce one-sided contracts, governments can get online data on demand, and cyber criminals can bypass many security measures.

Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead. Also in the new, all-digital Nuclear Option issue of InformationWeek: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Tom Claburn
50%
50%
Tom Claburn,
User Rank: Apprentice
1/25/2013 | 1:51:26 PM
re: Microsoft Finds People Want More Privacy Control
Agreed. I suspect that many of those who believe they have control over their personal information are fooling themselves.
John doe
50%
50%
John doe,
User Rank: Apprentice
1/25/2013 | 3:10:42 AM
re: Microsoft Finds People Want More Privacy Control
Im surprised Microsoft found anyone with that garbage OS that is Windows 8
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
1/24/2013 | 7:32:40 PM
re: Microsoft Finds People Want More Privacy Control
I'm surprised this stat on perceived lack of control isn't more like 85% rather than 45%. How many times do you find yourself unsubscribing from email sources that you never solicited. How many times do you see banners and other ads for the types of products you've recently searched?

Ten years ago your purchase habits would steer direct mail offers a few weeks or months after you made a significant purchase. Today even casual browsing can mold your Web experience within hours. That doesn't really scare me, but I certainly don't feel as if I have any control over the use of data about my online behavior.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.